Create and verify a hash with Bcrypt

Bcrypt is considered one of the stronger methods of creating encrypted hashes. With it,
you can specify the prefix and performance cost. The higher the cost, the stronger the hash.
However, the higher the cost, the longer it will take to generate the hash. The cost range
values are between '04' and '31'.

Again, it's best to use a strong salt for better security. In fact, it's considered a best
practice to use a strong random string as the salt, which the Bcrypt class generates
automatically for you if you don't specify one.

Create and verify a hash with Md5

This isn't to be confused with the basic md5() function built into PHP. It is not recommended
to use that function for password hashing as it only generates a 32-character hexadecimal number
and is vulnerable to dictionary attacks.

As before, it's best to use a strong salt for better security. In fact, it's considered a best
practice to use a strong random string as the salt. Like Bcrypt, the Md5 class will automatically
generate a random salt for you if you don't specify one.

Create and verify a hash with Sha

This isn't to be confused with the basic sha1() function built into PHP. Like md5(), it is
not recommended to use that function for password hashing as it only generates a 40-character
hexadecimal number and is vulnerable to dictionary attacks.

With the Sha class, you can set the bits (256 or 515) and rounds (between 1000 and 999999999),
which will affect the performance and strength of the hash.

As before, it's best to use a strong salt for better security. In fact, it's considered a best
practice to use a strong random string as the salt. Like Bcrypt and Md5, the Sha class will
automatically generate a random salt for you if you don't specify one.

As with the others, it's best to use a strong salt for better security. In fact, it's considered
a best practice to use a strong random string as the salt. Like the others, the Mcrypt class will
automatically generate a random salt for you if you don't specify one.